-
Handbook of Research on Wireless Security.pdf下载
资源介绍
Preface .............................................................................................................................................xxxii
Acknowledgment ...........................................................................................................................xxxiv
Section I
Security Fundamentals
Chapter I
Malicious Software in Mobile Devices ...................................................................................................1
Thomas M. Chen, Southern Methodist University, USA
Cyrus Peikari, Airscanner Mobile Security Corporation, USA
Chapter II
Secure Service Discovery .....................................................................................................................11
Sheikh I. Ahamed, Marquette University, USA
John F. Buford, Avaya Labs, USA
Moushumi Sharmin, Marquette University, USA
Munirul M. Haque, Marquette University, USA
Nilothpal Talukder, Marquette University, USA
Chapter III
Security of Mobile Code .......................................................................................................................28
Zbigniew Kotulski, Polish Academy of Sciences, Warsaw, Poland
Warsaw University of Technology, Poland
Aneta Zwierko, Warsaw University of Technology, Poland
Chapter IV
Identity Management ............................................................................................................................44
Kumbesan Sandrasegaran, University of Technology, Sydney, Australia
Mo Li, University of Technology, Sydney, Australia
Table of Contents
Chapter V
Wireless Wardriving ..............................................................................................................................61
Luca Caviglione, Institute of Intelligent Systems for Automation (ISSIA)—Genoa Branch, Italian
National Research Council, Italy
Chapter VI
Intrusion and Anomaly Detection in Wireless Networks ......................................................................78
Amel Meddeb Makhlouf, University of the 7th of November at Carthage, Tunisia
Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia
Chapter VII
Peer-to-Peer (P2P) Network Security: Firewall Issues .........................................................................95
Lu Yan, University College London, UK
Chapter VIII
Identity Management for Wireless Service Access .............................................................................104
Mohammad M.R. Chowdhury, University Graduate Center – UniK, Norway
Josef Noll, University Graduate Center – UniK, Norway
Chapter IX
Privacy Enhancing Techniques: A Survey and Classification .............................................................115
Peter Langendörfer, IHP, Germany
Michael Masser, IHP, Germany
Krzysztof Piotrowski, IHP, Germany
Steffen Peter, IHP, Germany
Chapter X
Vulnerability Analysis and Defenses in Wireless Networks ...............................................................129
Lawan A. Mohammad, King Fahd University of Petroleum and Minerals, Saudi Arabia
Biju Issac, Swinburne University of Technology – Sarawak Campus, Malaysia
Chapter XI
Key Distribution and Management for Mobile Applications .............................................................145
György Kálmán, University Graduate Center – UniK, Norway
Josef Noll, University Graduate Center – UniK, Norway
Chapter XII
Architecture and Protocols for Authentications, Authorization, and Accounting (AAA)
in the Future Wireless Communications Networks ............................................................................158
Said Zaghloul, Technical University Carolo-Wilhelmina – Braunschweig, Germany
Admela Jukan, Technical University Carolo-Wilhelmina – Braunschweig, Germany
Chapter XIII
Authentication, Authorisation, and Access Control in Mobile Systems .............................................176
Josef Noll, University Graduate Center – UniK, Norway
György Kálmán, University Graduate Center – UniK, Norway
Chapter XIV
Trustworthy Networks, Authentication, Privacy, and Security Models ..............................................189
Yacine Djemaiel, University of the 7th of November at Carthage, Tunisia
Slim Rekhis, University of the 7th of November at Carthage, Tunisia
Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia
Chapter XV
The Provably Secure Formal Methods for Authentication and Key Agreement Protocols ................210
Jianfeng Ma, Xidian University, China
Xinghua Li, Xidian University, China
Chapter XVI
Multimedia Encryption and Watermarking in Wireless Environment ................................................236
Shiguo Lian, France Telecom R&D Beijing, China
Chapter XVII
System-on-Chip Design of the Whirlpool Hash Function ..................................................................256
Paris Kitsos, Hellenic Open University (HOU), Patras, Greece
Section II
Security in 3G/B3G/4G
Chapter XVIII
Security in 4G .....................................................................................................................................272
Artur Hecker, Ecole Nationale Supérieure des Télécommunications (ENST), France
Mohamad Badra, National Center for Scientific Research, France
Chapter XIX
Security Architectures for B3G Mobile Networks ..............................................................................297
Christoforos Ntantogian, University of Athens, Greece
Christos Xenakis, University of Piraeus, Greece
Chapter XX
Security in UMTS 3G Mobile Networks ............................................................................................318
Christos Xenakis, University of Piraeus, Greece
Chapter XXI
Access Security in UMTS and IMS ....................................................................................................339
Yan Zhang, Simula Research Laboratory, Norway
Yifan Chen, University of Greenwich, UK
Rong Yu, South China University of Technology, China
Supeng Leng, University of Electronic Science and Technology of China, China
Huansheng Ning, Beihang University, China
Tao Jiang, Huazhong University of Science and Technology, China
Chapter XXII
Security in 2.5G Mobile Systems .......................................................................................................351
Christos Xenakis, University of Piraeus, Greece
Chapter XXIII
End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies ............................364
Sasan Adibi, University of Waterloo, Canada
Gordon B. Agnew, University of Waterloo, Canada
Chapter XXIV
Generic Application Security in Current and Future Networks ..........................................................379
Silke Holtmanns, Nokia Research Center, Finland
Pekka Laitinen, Nokia Research Center, Finland
Chapter XXV
Authentication, Authorization, and Accounting (AAA) Framework in Network
Mobility (NEMO) Environments ........................................................................................................395
Sangheon Pack, Korea University, South Korea
Sungmin Baek, Seoul National University, South Korea
Taekyoung Kwon, Seoul National University, South Korea
Yanghee Choi, Seoul National University, South Korea
Section III
Security in Ad Hoc and Sensor Networks
Chapter XXVI
Security in Mobile Ad Hoc Networks .................................................................................................413
Bin Lu, West Chester University, USA
Chapter XXVII
Privacy and Anonymity in Mobile Ad Hoc Networks ........................................................................431
Christer Andersson, Combitech, Sweden
Leonardo A. Martucci, Karlstad University, Sweden
Simone Fischer-Hübner, Karlstad University, Sweden
Chapter XXVIII
Secure Routing with Reputation in MANET ......................................................................................449
Tomasz Ciszkowski, Warsaw University, Poland
Zbigniew Kotulski, Warsaw University, Poland
Chapter XXIX
Trust Management and Context-Driven Access Control ....................................................................461
Paolo Bellavista, University of Bologna, Italy
Rebecca Montanari, University of Bologna, Italy
Daniela Tibaldi, University of Bologna, Italy
Alessandra Toninelli, University of Bologna, Italy
Chapter XXX
A Survey of Key Management in Mobile Ad Hoc Networks .............................................................479
Bing Wu, Fayetteville State University, USA
Jie Wu, Florida Atlantic University, USA
Mihaela Cardei, Florida Atlantic University, USA
Chapter XXXI
Security Measures for Mobile Ad-Hoc Networks (MANETs) ...........................................................500
Sasan Adibi, University of Waterloo, Canada
Gordon B. Agnew, University of Waterloo, Canada
Chapter XXXII
A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks .................................515
Hao Yin, Tsinghua University, China
Chuang Lin, Tsinghua University, China
Zhijia Chen, Tsinghua University, China
Geyong Min, University of Bradford, UK
Chapter XXXIII
Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks ..................................531
John Felix Charles Joseph, Nanyang Technological University, Singapore
Amitabha Das, Nanyang Technological University, Singapore
Boot-Chong Seet, Auckland Univerisity of Technology, New Zealand
Bu-Sung Lee, Nanyang Technological University, Singapore
Chapter XXXIV
Security in Wireless Sensor Networks ................................................................................................547
Luis E. Palafox, CICESE Research Center, Mexico
J. Antonio Garcia-Macias, CICESE Research Center, Mexico
Chapter XXXV
Security and Privacy in Wireless Sensor Networks: Challenges and Solutions .................................565
Mohamed Hamdi, University of November 7th at Carthage, Tunisia
Noreddine Boudriga, University of November 7th at Carthage, Tunisia
Chapter XXXVI
Routing Security in Wireless Sensor Networks ..................................................................................582
A.R. Naseer, King Fahd University of Petroleum & Minerials, Dhahran
Ismat K. Maarouf, King Fahd University of Petroleum & Minerials, Dhahran
Ashraf S. Hasan, King Fahd University of Petroleum & Minerials, Dhahran
Chapter XXXVII
Localization Security in Wireless Sensor Networks ...........................................................................617
Yawen Wei, Iowa State University, USA
Zhen Yu, Iowa State University, USA
Yong Guan, Iowa State University, USA
Chapter XXXVIII
Resilience Against False Data Injection Attack in Wireless Sensor Networks ...................................628
Miao Ma, The * University of Science and Technology, *
Chapter XXXIX
Survivability of Sensors with Key and Trust Management ................................................................636
Jean-Marc Seigneur, University of Genev, Switzerland
Luminita Moraru, University of Genev, Switzerland
Olivier Powell, University of Patras, Greece
Chapter XL
Fault Tolerant Topology Design for Ad Hoc and Sensor Networks ...................................................652
Yu Wang, University of North Carolina at Charlotte, USA
Section IV
Security in Wireless PAN/LAN/MAN Networks
Chapter XLI
Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections ..............666
Georgios Kambourakis, University of the Aegean, Greece
Angelos Rouskas, University of the Aegean, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Chapter XLII
Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring .........................................................681
Miguel A. Ruiz, University of Alcala, Spain
Felipe Espinosa, University of Alcala, Spain
David Sanguino, University of Alcala, Spain
AbdelBaset M.H. Awawdeh, University of Alcala, Spain
Chapter XLIII
Security in WLAN ..............................................................................................................................695
Mohamad Badra, Bât ISIMA, France
Artur Hecker, INFRES-ENST, France
Chapter XLIV
Access Control in Wireless Local Area Networks: Fast Authentication Schemes .............................710
Jahan Hassan, The University of Sydney, Australia
Björn Landfeldt, The University of Sydney, Australia
Albert Y. Zomaya, The University of Sydney, Australia
Chapter XLV
Security and Privacy in RFID Based Wireless Networks ...................................................................723
Denis Trček, University of Ljubljana, Slovenia
Chapter XLVI
Security and Privacy Approaches for Wireless Local and Metropolitan
Area Networks (LANs & MANS) ......................................................................................................732
Giorgos Kostopoulos, University of Patras, Greece
Nicolas Sklavos, Technological Educational Institute of Mesolonghi, Greece
Odysseas Koufopavlou, University of Patras, Greece
Chapter XLVII
End-to-End (E2E) Security Approach in WiMAX:
A Security Technical Overview for Corporate Multimedia Applications ...........................................747
Sasan Adibi, University of Waterloo, Canada
Gordon B. Agnew, University of Waterloo, Canada
Tom Tofigh, WiMAX Forum, USA
Chapter XLVIII
Evaluation of Security Architectures for Mobile Broadband Access .................................................759
Symeon Chatzinotas, University of Surrey, UK
Jonny Karlsson, Arcada University of Applied Sciences, Finland
Göran Pulkkis, Arcada University of Applied Sciences, Finland
Kaj Grahn, Arcada University of Applied Sciences, Finland